Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 171 Next »

14%
This Issue's CD
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
, or even over the network. Among other things, TRK Linux lets you reset Windows passwords, recover dying hard disks, clone computers over a network, clean up Windows junk files, read and write to NTFS
14%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
The activity of penetration testing has been around for decades, but the past five years or so have seen radical changes in networking, beginning with the dissolved perimeter. Remember the good days
14%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
as authorization entries. Listing 2 shows a rule that lets user klaus change the global network settings in Network Manager. Listing 2: Rules for LocalAuthority [Klaus is allowed to modify network settings
14%
On the ground at the Linux Foundation's signature event
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Swapnil Bhartiya and Brian Behlendorf, Hyperledger Project
created Storj when he was trying to scratch his own itch of finding inexpensive and safe cloud storage solutions. Storj is building an Airbnb-like service for users with surplus storage and networking
14%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
some interesting innovations for the VM hardware. For example, it will be possible in the future to add virtual network adapters or memory to a virtual machine during operation and to remove
14%
Tech News:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
. Nikita Buchka wrote on a blog post, "Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, the wireless router that serves the network." The trojan deploys
14%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
A Domain Name System (DNS) name resolution configuration that is not carefully considered or simply incorrect will tend to cause a variety of problems on a network. Unstable server-based services
14%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
an agent, but this approach has its downside. For example, all the data in the backup needs to cross the network wire to the backup server, and if you don't have a dedicated connection, impairments
14%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
, and non-profit organizations. According to the company, ClearOS Professional 6 is an affordable and powerful network, gateway, and server OS providing critical security and management tools – including
14%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
, auto-discovery, auto-configuration, self-forming networks, IPSec, etc.). Why You Care about IPv6 IPv4 has been in use since 1981 and is beginning to show its age, especially in one critical area

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice